Network steganography based security framework for cyber-physical systems
From MaRDI portal
Publication:6203495
Recommendations
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
- A data‐based private learning framework for enhanced security against replay attacks in cyber‐physical systems
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- A transmission scheme for secure estimation of cyber-physical systems against malicious attack
Cites work
- scientific article; zbMATH DE number 44406 (Why is no real title available?)
- scientific article; zbMATH DE number 6936864 (Why is no real title available?)
- A Moving Target Defense for Securing Cyber-Physical Systems
- A dynamic event-triggered resilient control approach to cyber-physical systems under asynchronous DoS attacks
- Adaptive control for nonlinear cyber-physical systems under false data injection attacks through sensor networks
- An Attack-Resilient Pulse-Based Synchronization Strategy for General Connected Topologies
- Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure
- Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach
- Global Synchronization of Pulse-Coupled Oscillator Networks Under Byzantine Attacks
- On Autocovariance Least-Squares Method for Noise Covariance Matrices Estimation
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Optimal Linear Cyber-Attack on Remote State Estimation
- Optimal sensor attacks in cyber-physical systems with round-robin protocol
- Remote State Estimation in the Presence of an Active Eavesdropper
- State estimation under false data injection attacks: security analysis and system protection
- State-Secrecy Codes for Networked Linear Systems
- Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper
- Worst-case stealthy innovation-based linear attack on remote state estimation
This page was built for publication: Network steganography based security framework for cyber-physical systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6203495)